You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: _posts/2025-11-14-unlocking-seamless-access-how-to-ensure-users-can-create-connections-for-copilot-studio-agents.md
+32-36Lines changed: 32 additions & 36 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -25,72 +25,67 @@ This blog post provides a **step-by-step guide** to:
25
25
Connections are the backbone of Copilot Studio agents. If users lack permissions, agents cannot function properly. By aligning **Entra ID groups**, **Dataverse teams**, and **security roles**, you ensure a smooth experience for every user.
26
26
27
27
---
28
+
> [!NOTE]
29
+
> You can create a mock security group to test the tutorial end-to-end. We will explaining how to do so below.
28
30
29
31
## Step 1: Verify Entra ID Security Group Membership
30
-
1. Go to **Microsoft Entra admin center**.
32
+
1. Go to **Microsoft Entra admin center** (**https://entra.microsoft.com/**).
31
33
2. Navigate to **Groups → Security Groups**.
32
34
3. Confirm that all intended users are members of the relevant security group.
33
35
36
+
37
+
34
38
---
35
39
36
40
## Step 2: Create Corresponding Security Teams in Dataverse
37
-
1. Open **Power Platform Admin Center (PPAC)**.
41
+
1. Open **Power Platform Admin Center (PPAC)** (**https://admin.powerplatform.microsoft.com/**).
38
42
2. Select the environment where your Copilot Studio agent resides.
39
43
3. Go to **Settings → Users + Permissions → Teams**.
40
44
4. Click **New Team**:
41
-
-**Team Type**: *Azure AD Security Group*.
42
-
-**Name**: Match the Entra ID group name for clarity.
43
-
-**Azure AD Group ID**: Paste the Object ID of the Entra ID security group.
45
+
44
46
5. Assign appropriate **security roles** to this team (e.g., *Environment Maker*, *Basic User*, or custom roles granting connection creation).
45
47
46
48
---
47
49
48
50
## Step 3: Force Sync Users into Dataverse
49
-
By default, sync happens periodically, but you can force it:
51
+
By default, sync happens periodically. In order to make sure the latest changes regarding additions/removals of users are reflected immediately you need to force sync:
50
52
51
-
### Option A: Power Platform Admin Center
52
-
- Navigate to **Users** in the environment.
53
+
### Option A (manual): Power Platform Admin Center
54
+
- Navigate to **Users** in the environment (**Manage → Environment → RespectiveEnvironment → User - See all**).
53
55
- Click **Refresh** for the affected user(s).
54
56
55
-
### Option B: PowerShell (Single Environment)
56
-
```powershell
57
-
# Connect to Dataverse
58
-
Add-PowerAppsAccount
57
+
### Option B (automated): Triggered Power Automate Flow(s) that force syncs users (addition/removal)
59
58
60
-
# Force user sync for one environment
59
+
* Go to **https://make.powerautomate.com/**
61
60
62
-
```
63
-
### Option C: Bulk Sync for All Environments
64
-
```powershell
65
-
# Connect to Dataverse
66
-
Add-PowerAppsAccount
61
+
* Create a new **Automated cloud flow** and use the trigger
62
+
**Office 365 Groups – When a group member is added or removed**.
* Choose the Entra Security Group you want to monitor.
72
65
73
-
## ✅ Step 4: Validate Access
74
-
1. In PPAC, confirm that users appear under **Users** and are associated with the correct team.
75
-
2. Check that the team has the required security roles.
76
-
3. Test by having a user create a **connection reference** in a solution.
77
66
78
-
---
67
+
* Add **Power Platform for Admins – Force Sync User**
68
+
-**Environment:** select the target environment
69
+
-**ObjectId:** use the trigger’s `User Id` dynamic value
70
+
71
+
* Then add **Dataverse – Perform a bound action**:
72
+
-**Table:**`teams`
73
+
-**Action:**`SyncGroupMembersToTeam`
74
+
-**Row ID:** the GUID of the Dataverse Team linked to your security group
75
+
76
+
You can find it here:
79
77
80
-
## ✅ Step 5: Confirm Agent Connection Usage
78
+
* Save and enable the flow.
79
+
80
+
And that's it. Now whenever you add/remove a user from the Entra ID security group, the automated cloud flow will be triggered, syncing the latest changes to the connected Dataverse security team.
81
+
82
+
## Step 5: Confirm Agent Connection Usage
81
83
- In **Copilot Studio**, open the agent.
82
84
- Verify that the agent uses the correct **connection reference**.
83
85
- Ensure the user can run the agent without permission errors.
84
86
85
87
---
86
88
87
-
## Troubleshooting Tips
88
-
-**Missing Users**: Ensure the Entra ID group Object ID is correct and the team type is set to *Azure AD Security Group*.
89
-
-**Stale Roles**: Reassign roles to the team and refresh user access.
90
-
-**Connection Errors**: Validate that the connection reference is mapped correctly in the solution.
91
-
92
-
---
93
-
94
89
## Best Practices
95
90
- Always use **Azure AD Security Group Teams** for scalable permission management.
96
91
- Assign roles at the **team level**, not individual users.
0 commit comments